Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus

被引:10
|
作者
Boudgoust, Katharina [1 ]
Scholl, Peter [1 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
关键词
RENYI DIVERGENCE; SECURITY; PROOFS;
D O I
10.1007/978-981-99-8721-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The learning with errors (LWE) assumption is a powerful tool for building encryption schemes with useful properties, such as plausible resistance to quantum computers, or support for homomorphic computations. Despite this, essentially the only method of achieving threshold decryption in schemes based on LWE requires a modulus that is superpolynomial in the security parameter, leading to a large overhead in ciphertext sizes and computation time. In this work, we propose a (fully homomorphic) encryption scheme that supports a simple t-out-of-n threshold decryption protocol while allowing for a polynomial modulus. The main idea is to use the Renyi divergence (as opposed to the statistical distance as in previous works) as a measure of distribution closeness. This comes with some technical obstacles, due to the difficulty of using the Renyi divergence in decisional security notions such as standard semantic security. We overcome this by constructing a threshold scheme with a weaker notion of one-way security and then showing how to transform any one-way (fully homomorphic) threshold scheme into one guaranteeing indistinguishability-based security.
引用
收藏
页码:371 / 404
页数:34
相关论文
共 50 条
  • [41] Optimizations in Fully Homomorphic Encryption
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-cherif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 150 - 166
  • [42] A Flexible Fully Homomorphic Encryption
    Ma, Chunguang
    Li, Juyan
    Du, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 761 - 772
  • [43] The polynomial approximate common divisor problem and its application to the fully homomorphic encryption
    Cheon, Jung Hee
    Hong, Hyunsook
    Lee, Moon Sung
    Ryu, Hansol
    INFORMATION SCIENCES, 2016, 326 : 41 - 58
  • [44] Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption
    Nabeel, Mohammed
    Gamil, Homer
    Soni, Deepraj
    Ashraf, Mohammed
    Gebremichael, Mizan Abraha
    Chielle, Eduardo
    Karri, Ramesh
    Sanduleanu, Mihai
    Maniatakos, Michail
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (06) : 1924 - 1928
  • [45] An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme
    Tan, Weihang
    Au, Aengran
    Aase, Benjamin
    Aao, Shuhong
    Lao, Yingjie
    PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS 2019), 2019, : 85 - 90
  • [46] Faster Fully Homomorphic Encryption
    Stehle, Damien
    Steinfeld, Ron
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 377 - +
  • [47] The Rise of Fully Homomorphic Encryption
    Creeger M.
    Queue, 2022, 20 (04): : 39 - 60
  • [48] A Flexible RNS-based Large Polynomial Multiplier for Fully Homomorphic Encryption
    Mkhinini, A.
    Maistri, P.
    Leveugle, R.
    Tourki, R.
    Machhout, M.
    PROCEEDINGS OF 2016 11TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2016, : 131 - 136
  • [49] Fully Homomorphic Encryption for Mathematicians
    Silverberg, Alice
    WOMEN IN NUMBERS 2: RESEARCH DIRECTIONS IN NUMBER THEORY, 2013, 606 : 111 - 123
  • [50] Secure Image processing using LWE Based Homomorphic Encryption
    Challa, RatnaKumari
    VijayaKumari, G.
    Sunny, B.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,